Volume 22,Issue 8,2011 Table of Contents
Retrieval Effectiveness Analysis for Anchor TextsZHOU Bo,LIU Yi-Qun,ZHANG Min,JIN Yi-Jiang and MA Shao-Ping2011,22(8):1714-1724 [Abstract(3722)] [View PDF(3261)645.17 K]Semantic Role Labeling in Chinese Language for Nominal PredicatesLI Jun-Hui,ZHOU Guo-Dong,ZHU Qiao-Ming and QIAN Pei-De2011,22(8):1725-1737 [Abstract(4053)] [View PDF(3080)706.38 K]Learning and Synchronized Privacy Preserving Frequent Pattern MiningGUO Yu-Hong,TONG Yun-Hai,TANG Shi-Wei and WU Leng-Dong2011,22(8):1749-1760 [Abstract(3484)] [View PDF(3475)650.23 K]Mining Hotspots from Multiple Text Streams Based on Stream Information DistanceYANG Ning,TANG Chang-Jie,WANG Yue,CHEN Yu,ZHENG Jiao-Ling and LI Hong-Jun2011,22(8):1761-1770 [Abstract(3431)] [View PDF(3083)608.39 K]Indexing the World Wide Web: Intelligent Query Suggestion Based on Term Relation NetworkLI Ya-Nan,WANG Bin,LI Jin-Tao and LI Peng2011,22(8):1771-1784 [Abstract(3461)] [View PDF(3753)505.71 K]Finding High Quality Threads in Web ForumsCHEN You,CHENG Xue-Qi and YANG Sen2011,22(8):1785-1804 [Abstract(4028)] [View PDF(4138)471.31 K]Continuous K Nearest Neighbor Queries over Moving Objects Based on Multi-Core and Multi- ThreadingZHAO Liang,JING Ning,CHEN Luo,LIAO Wei and ZHONG Zhi-Nong2011,22(8):1805-1815 [Abstract(3412)] [View PDF(3109)616.21 K]Near Duplicated Web Pages Detection Based on Concept and Semantic NetworkCAO Yu-Juan,NIU Zhen-Dong,ZHAO Kun and PENG Xue-Ping2011,22(8):1816-1826 [Abstract(3792)] [View PDF(4229)668.40 K]Efficient Cluster Analysis Method for Protein SequencesTANG Dong-Ming,ZHU Qing-Xin,YANG Fan and CHEN Ke2011,22(8):1827-1837 [Abstract(3946)] [View PDF(4443)613.34 K]Network Cross-Layer Mapping Based on Utility MaximizationLI Shi-Yong,YANG Dong,QIN Ya-Juan and ZHANG Hong-Ke2011,22(8):1855-1871 [Abstract(3171)] [View PDF(3194)837.25 K]Fine-Grained Mandatory Query Access Control Model and Its Efficient Realization for Spatial Vector DataZHANG Yan,CHEN Chi and FENG Deng-Guo2011,22(8):1872-1883 [Abstract(3416)] [View PDF(3155)780.78 K]Detection Approach of DDoS Attacks Based on Conditional Random FieldsLIU Yun,CAI Zhi-Ping,ZHONG Ping,YIN Jian-Ping and CHENG Jie-Ren2011,22(8):1897-1910 [Abstract(2944)] [View PDF(4078)749.40 K]Impossible Differential and Integral Cryptanalysis of ZodiacSUN Bing,SUN Bing and SUN Bing2011,22(8):1911-1917 [Abstract(3295)] [View PDF(2831)407.72 K]Certificateless Signcryption Scheme Without Bilinear PairingLIU Wen-Hao and XU Chun-Xiang2011,22(8):1918-1926 [Abstract(4304)] [View PDF(3881)483.62 K]Efficient Rendering of Single-Pass Order-Independent Transparency via CUDA RendererHUANG Meng-Cheng,LIU Fang,LIU Xue-Hui and WU En-Hua2011,22(8):1927-1933 [Abstract(3167)] [View PDF(3307)485.51 K]Approach for Physically-Based Animation of Tree Branches Impacting by RaindropsYANG Meng and WU En-Hua2011,22(8):1934-1947 [Abstract(3580)] [View PDF(3223)667.55 K]All-Frequency Shadows Rendering Algorithm for Dynamic Scenes Based on Harr WaveletsZHAO Qin-Ping and CHE Ying-Hui2011,22(8):1948-1959 [Abstract(3133)] [View PDF(3049)749.87 K]Fuzzy Description and Extracting Methods of Complex Feature Regions in Flow FieldsXU Hua-Xun,LI Si-Kun,MA Qian-Li and CAI Xun2011,22(8):1960-1972 [Abstract(2849)] [View PDF(3150)967.19 K]
Research on Markov Logic NetworksXU Cong-Fu,HAO Chun-Liang,SU Bao-Jun and LOU Jun-Jie2011,22(8):1699-1713 [Abstract(7922)] [View PDF(9401)764.57 K]
Dynamic Niche-Based Self-Organizing Learning AlgorithmZHOU Chuan-Hua and ZHOU Chuan-Hua2011,22(8):1738-1748 [Abstract(4869)] [View PDF(3923)667.87 K]
Regular Expressions Matching for Network SecurityZHANG Shu-Zhuang,LUO Hao and FANG Bin-Xing2011,22(8):1838-1854 [Abstract(6202)] [View PDF(6680)864.69 K]
Collusion-Resistant Digital Fingerprinting Based on Residual Characters TrackingWANG Zu-Xi,WANG Wen-Zong,GE Qiang and HU Han-Ping2011,22(8):1884-1896 [Abstract(4230)] [View PDF(3679)801.68 K]